Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Researchers have shown that running a man-in-the-middle attack against a Tesla owner can potentially compromise their account, unlock their car, and ultimately allow threat actors to drive away with it. There are, of coruse, a number a caveats. Much of this hinges on some social engineering, and tricking the Tesla owner to use a spoofed Wi-Fi Read more...
The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) is the primary interface between the public and the U.S. government, to report cybercrime and collect information about cybersecurity threats. The IC3 recently published a paper outlining a significant increase in reports and losses throughout... Read more...
Following yesterday's report on an Air National Guard member sharing classified documents around the Internet, it seems the U.S. Government cannot catch a break. A 63-year-old civilian member of the U.S. Air Force assigned to U.S. Strategic Command was arrested on March 2nd “allegedly conspiring to transmit and... Read more...
Dell Precision 7875 Tower Workstation: As Configured - $31,065 at Dell.com Dell's Precision 7875 Tower Workstation is a regular-sized PC that packs in server-class power, giving it the capability to dunk on previous-genn systems in rendering, scientific computing, and of course, machine learning workloads. Incredible... Read more...
Facebook, Instagram, and other Meta-owned properties went down earlier today and are still suffering from the aftershocks. Reports initially started to surface suggesting that threat actors were behind this and that it was a DDoS attack, but Meta appears to be claiming otherwise. Whether this was a technical issue or... Read more...
The criminal underbelly of cybersecurity is a shady place, with threat actors thieving data and information wherever possible. On the seemingly competent side of the business, some folks also wish to make a quick buck off the latest hype and not do much actual hacking. Such is the case with the now former group called... Read more...
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs you lost the remote for, and other hacker-type things, especially on penetration... Read more...
Both Helldivers 2 and Palworld have seen explosive growth and popularity since their respective releases, drawing in millions of gamers around the world. With this popularity, though, also comes opportunistic folks trying to make a quick buck by piggybacking off the hype. This is exactly what happened both titles... Read more...
There has been a smorgasbord of breaches as of late, though the U.S. government, in conjunction with international partners, is starting to quell that problem. However, in the past year, threat actors have had their pick of the buffet for breaches, which now includes Golden Corral, a literal buffet. The famous... Read more...
Cybersecurity is an incredibly complex and vast topic, requiring a multifaceted approach across multiple sectors and disciplines, so the White House wants you to stop using C and C++. While that is a bit of an unnuanced simplification, this is essentially the case, following a publication from the Office of the... Read more...
Most forms of malware can only make the attacker money in a roundabout way. For example, selling stolen data or bundling infected systems into a rentable botnet. Ransomware is different, however, in that it can be a moneymaker all on its own, and that's why infections have increased every year. IBM has debuted a new... Read more...
It turns out that you do not need Chinese backdoors in products if people are just installing IoT devices with poor security. This is evidenced by a recent report regarding video doorbells manufactured by a Chinese company, which can be easily compromised. Further, these doorbells are sold around the United States at... Read more...
Privacy is a hot-button issue for individuals and the enterprise, which has lead to some clever innovations, such as self-destructing USB drives, among other devices. To that end, the Biden administration is looking to address data privacy with a new executive order with a goal to “protect Americans’ sensitive... Read more...
When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim that it has compromised Epic Games and made off with a good handful of data... Read more...
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when the Biden Administration sought to crack down on the threat at the International... Read more...
Artificial intelligence (AI) has taken off in the last few years. Buoyed by massive increases in computational power, the latest large language models (LLMs) can behave in remarkably lifelike ways, but their inner workings are not always clear. What if those inner workings turn on us? That's certainly a worry, based... Read more...
Dell Precision 7960 And 5860 Workstations: As Configured - $19,972 and $9,988 Respectively Dell Precision 7960 and 5860 workstations bring professional Xeon W and NVIDIA RTX firepower to chew through complex engineering and creative workloads Flagship Intel Xeon W 3400 And 2400 Series CPUs Support Quad-GPU And... Read more...
We've seen malware that wants to steal your files, money, or even your identity, but the new "Gold Pickaxe" mobile malware goes a step further. This nasty little piece of software is active on both Android and iOS, and it steals the victim's face. Security researchers warn the malware could be used to create deepfake... Read more...
Microsoft has just set new performance targets for PCs to be considered AI-ready. The trillion-dollar software, services and devices company has specified 40 TOPS (Trillions Of Operations Per Second) in AI computational throughput and 16GB of memory at a minimum, for a system to potentially have all AI features... Read more...
Intel 5th Generation Xeon Processors Codename: Emerald Rapids Intel refreshes its tiled chiplet based Xeon processors with more cores, more cache, higher frequencies, and enhanced power efficiency.   Higher Core Counts Improved Performance & Efficiency Drop-In Compatible With 4th Gen Faster Memory Support... Read more...
Security researchers first spotted the Chameleon Android malware this past spring. This pervasive banking trojan has now evolved to become something much more dangerous. Through a series of fake system dialogs, the malware attempts to use the Android system Accessibility service, whic effectively gives Chameleon the... Read more...
In the threat intelligence and cybersecurity space, an interesting development has unfolded over the past few days regarding BlackCat or ALPHV, the group behind the Reddit security breach and the more recent 23AndMe data breach. It initially appeared as though the FBI had seized the group’s website, though BlackCat... Read more...
Prev 1 2 3 4 5 Next